Twenty years of rewriting logic
J Meseguer - The Journal of Logic and Algebraic Programming, 2012 - Elsevier
Rewriting logic is a simple computational logic that can naturally express both concurrent
computation and logical deduction with great generality. This paper provides a gentle …
computation and logical deduction with great generality. This paper provides a gentle …
Precise analysis of string expressions
We perform static analysis of Java programs to answer a simple question: which values may
occur as results of string expressions? The answers are summarized for each expression by …
occur as results of string expressions? The answers are summarized for each expression by …
An overview of probabilistic tree transducers for natural language processing
Probabilistic finite-state string transducers (FSTs) are extremely popular in natural language
processing, due to powerful generic methods for applying, composing, and learning them …
processing, due to powerful generic methods for applying, composing, and learning them …
Taxonomy of XML schema languages using formal language theory
On the basis of regular tree grammars, we present a formal framework for XML schema
languages. This framework helps to describe, compare, and implement such schema …
languages. This framework helps to describe, compare, and implement such schema …
JSON: Data model and query languages
Despite the fact that JSON is currently one of the most popular formats for exchanging data
on the Web, there are very few studies on this topic and there is no agreement upon a …
on the Web, there are very few studies on this topic and there is no agreement upon a …
Adding interactive visual syntax to textual code
Many programming problems call for turning geometrical thoughts into code: tables,
hierarchical structures, nests of objects, trees, forests, graphs, and so on. Linear text does …
hierarchical structures, nests of objects, trees, forests, graphs, and so on. Linear text does …
On the complexity of equational horn clauses
Security protocols employing cryptographic primitives with algebraic properties are
conveniently modeled using Horn clauses modulo equational theories. We consider clauses …
conveniently modeled using Horn clauses modulo equational theories. We consider clauses …
Rewriting for cryptographic protocol verification
T Genet, F Klay - International Conference on Automated Deduction, 2000 - Springer
On a case study, we present a new approach for verifying cryptographic protocols, based on
rewriting and on tree automata techniques. Protocols are operationally described using …
rewriting and on tree automata techniques. Protocols are operationally described using …
Deciding entailments in inductive separation logic with tree automata
Separation Logic (SL) with inductive definitions is a natural formalism for specifying complex
recursive data structures, used in compositional verification of programs manipulating such …
recursive data structures, used in compositional verification of programs manipulating such …
Variant-based satisfiability in initial algebras
J Meseguer - Science of Computer Programming, 2018 - Elsevier
Although different satisfiability decision procedures can be combined by algorithms such as
those of Nelson–Oppen or Shostak, current tools typically can only support a finite number of …
those of Nelson–Oppen or Shostak, current tools typically can only support a finite number of …